Course description
Burp Suite is a set of tools to test web applications for penetration testing. Burp suite community edition gives tools and strategy to assist in hunting and finding bugs on the target platforms. This course covers: Burp Dashboard, Repeater module, Attack Types, and payloads and hidden form fields.
Prerequisites
Web application development and HTML knowledge are required
Meet the expert
Atul has been involved in information security, IT auditing, and penetration testing web apps in the field of information security training for over 8 years.
Course outline
Module 3
Burp Dashboard and Live Task (38:27)
- Introduction (00:08)
- Burp Dashboard and live task (04:11)
- New Live Passive Scan (06:25)
- Individual Tasks (05:42)
- Burp UserOptions and ProjectOptions customisations (05:01)
- User Options (04:02)
- Reload Options (04:52)
- Preserve User Options (03:19)
- Override User Options (04:35)
- Summary (00:08)
Repeater Module Testing (34:43)
- Introduction (00:08)
- Repeater module testings (04:37)
- Searching (05:42)
- Request Tips (08:45)
- Burp intruder Configurations (05:16)
- Intruder Options (02:59)
- Attack Types Overview (07:04)
- Summary (00:08)
Module 4
Burp Intruder Attack Types (29:13)
- Introduction (00:08)
- Burp Intruder attack types - Attacks (05:38)
- Battering Ram and Pitchfork (05:25)
- Cluster Bomb (08:46)
- Payload processing and bruteforcer (04:51)
- Payload Processing Rules (04:15)
- Summary (00:08)
Grep-extract with Cluster Bomb (26:36)
- Introduction (00:08)
- Grep-Match _ Grep-extract with clustor bomb (06:40)
- Match Unique Value (06:04)
- Valid User (04:57)
- SQL Injection Ninja (04:45)
- Match Expressions for SQL Injection (03:51)
- Summary (00:08)
Payload Types and Hidden Form Fields (23:16)
- Introduction (00:08)
- Some Best payloads type used and hidden form fiel (06:07)
- Null Payload and Other Types (12:39)
- Username Request and Response (00:08)
- User names generator (04:04)
- Summary (00:08)